Validating Data Integrity in Steganographed Images using Embedded Checksum Technique

Print
IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence
© 2015 by IJCA Journal
NCRIIAMI 2015 - Number 1
Year of Publication: 2015
Authors:
Jagan Raj J
Prasath S

Jagan Raj J and Prasath S. Article: Validating Data Integrity in Steganographed Images using Embedded Checksum Technique. IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence NCRIIAMI 2015(1):5-8, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Jagan Raj J and Prasath S},
	title = {Article: Validating Data Integrity in Steganographed Images using Embedded Checksum Technique},
	journal = {IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence},
	year = {2015},
	volume = {NCRIIAMI 2015},
	number = {1},
	pages = {5-8},
	month = {June},
	note = {Full text available}
}

Abstract

In this paper, discuss on validating the data integrity of an image that carries secret information across the network. Validating the data integrity has been always a difficult task on steganographed image files. To discuss a way through which data integrity is verified for possible image tampering by intruders using md5 checksum in self embedded technique.

References

  • Compression Algorithms for Real Programmers, Wayner Peter. Publisher: Morgan Kaufmann, 11 Oct 1999 ISBN-10: 0127887741
  • Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
  • From Wikipedia, "Hash function," Jan 2014, URL: http://en. wikipedia. org/wiki/Hash_function
  • Behrouz A. Forouzan,"Data communication and networking," Tata McGraw-Hill Publication, 2nd ed. , 2003, pp. 799-800.
  • William Stallings," Cryptographic and network security," Pearson Prentice Hall Publication, 4th ed. , 2006, pp. 320-375
  • Holub V, Fridrich J: Digital image steganography using universal distortion. In 1st ACM Information Hiding and Multimedia Security Workshop. Montpellier; 17–19 June 2013.
  • W. Bender, "Techniques for Data Hiding," IBM Systems Journal, Vol. 35, no. 7, Pgs 313-336, 1996
  • Wang Qian, et . al,"Steganography and Steganalysis based on digital image," IEEE 4th International Conference on Image and Signal Processing, Shanghai, 15-17 Oct. 2011, pp. 252-255.
  • Adity Sharma, Anoo Agarwal and Vinay Kumar, " A simple technique for steganography", arXiv:1307. 8385v1 [cs. MM] 31 Jul-2013.
  • Vojt?ch Holub, Jessica Fridrich, Tomáš Denemark "Universal distortion function for steganography in an arbitrary domain", EURASIP Journal on Information Security, January 2014.
  • Denemark T, Fridrich J, Holub V: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014. Edited by: Alattar A, Memon ND, Heitzenrater CD. San Francisco; 2–6 February 2014